4P
Search
K
Links
2️⃣

Comparison Tables

A Comprehensive Analysis of 4P dMail & dChat in Contrast to Existing Web2 & Web3 Communication Platforms.

4P dMail vs. Web2 Competitors

Attribute
4P dMail
Gmail
Proton Mail
Yahoo Mail
Model
Decentralized
Centralized
Centralized
Centralized
Decentralized Storage
🚫
🚫
🚫
End-to-End (E2E) Encryption
🚫
🚫
Self-Custodial E2E Encryption
🚫
🚫
🚫
Permissionless Access
🚫
🚫
🚫
Immutable Communication & Data
🚫
🚫
🚫
Communication & Data Portability
✅🚫
🚫
🚫
Self-Custodial Open-source Application
🚫
🚫
🚫
dID self-custody
🚫
🚫
🚫
No Data-Ownership Loss
🚫
🚫
🚫
No Data Mining
🚫
🚫
🚫
De-platforming Resistant
🚫
🚫
🚫

4P dChat vs. Web2 Competitors

Attribute
4P dChat
Telegram
WhatsApp
Facebook Messenger
Model
Decentralized
Centralized
Centralized
Centralized
Decentralized Storage
🚫
🚫
🚫
DM & Group E2E Encryption
✅🚫
🚫
Self-Custodial E2E Encryption
🚫
🚫
🚫
Permissionless Access
🚫
🚫
🚫
Immutable Communication
🚫
🚫
🚫
Communication & Data Portability
🚫
🚫
🚫
Self-Custodial Open-source Application
🚫
🚫
🚫
dID self-custody
🚫
🚫
🚫
No Data-Ownership Loss
🚫
🚫
🚫
No Data Mining
🚫
🚫
🚫
De-platforming Resistant
🚫
🚫
🚫
Explanation:
  • Model: Web2 legacy communication platforms may currently excel in speed and ease of access, but its centralized model has not proven reliable and sustainable in the long run. 4P sources its security from underlying decentralized blockchain networks enabling communication permissionless, immutability and self-custody, while preventing data ownership loss.
  • Decentralized Storage: Existing legacy communication platforms use centralized databases which are vulnerable to potential security breaches, data loss, and single points of failure. 4P utilises decentralized storage instead of a centralised database, which empowers users with data self-custody and prevents security breaches.
  • Self-Custodial E2E Encryption: End-to-end encryption has also become present within legacy communication platforms. The only problem is that users don't control the encryption keys. By owning encryption keys, 4P enables users to take control over their communication encryption in a true self-custodial way.
  • Permissionless Access: In comparison to permisioned legacy communication applications, 4P allows users to onboard permissionally without any approvals.
  • Immutable Communication: Due to its unique 1 email/message = 1 L1/L2 transaction model, the 4P emails and messages are immutable, enhancing communication transparency and trust.
  • Communication & Data Portability: Compared to siloed legacy communication applications, the emails, messages and accompanying data within the 4P system are portable. 4P application acts only as a conduit enabling communication interaction.
  • Self-Custodial Open-source Application: Existing legacy communication applications are custodial by nature, meaning they control, manage and own your communication data while granting access permissions and managing communication encryption keys. As a complete opposite, the 4P application works in a true self-custodial way. Communication is executed on public blockchains where only users can access and decrypt it using their private keys. In the case of the 4P downtime, anyone can spin up and run their open-source dMail or dChat client and access their communication data.
  • dID Self-Custody: Legacy communication applications own user handles, which in fact act as user digital identity. In the case of 4P, the user wallet acts as dID, making digital identity truly self-custodial and within the user's control.
  • No Data-Ownership Loss: By utilising self-custodial decentralized storage NFTs, 4P enables users to retain data ownership, ensuring they retain full control over their communication data. Access to communication data is possible only with the user's private key!
  • Data Mining: Data mining has become the core revenue driver behind existing legacy communication platforms. Due to the 4P's decentralized and self-custodial design, the users are in complete control over their data. No data ownership is lost or data mined in the process.
  • De-platforming Resistant: Due to its permissioned model, many de-platforming use cases are happening in legacy communication applications. The core self-custodial design and communication data portability make the 4P application de-platforming resistant.

4P dMail vs. Web3 Competitors

Attribute
4P dMail
Ethermail
Dmail
MailChain
LedgerMail
Decentralization Coefficient
= L1/L2
TBD
TBD
TBD
TBD
Wallet Login
🚫
🚫
Public On-chain Communication
🚫
🚫
🚫
E2E Encryption
Self-custodial E2E Encryption
🚫
🚫
🚫
🚫
Immutable Communication & Data
🚫
TBD
TBD
Communication & Data Portability
TBD
🚫
TBD
🚫
Decentralized Storage
🚫
🚫
Self-custodial Decentralized Storage
🚫
TBD
🚫
🚫
Self-Custodial Open-source Application
🚫
TBD
🚫
Multi-chain Deployment
🚫
🚫
No Data Mining
TBD
TBD
TBD
TBD
De-platforming Resistant
TBD
TBD
TBD
🚫
White-label Availability
🚫
🚫
🚫
🚫

4P dChat vs. Web3 Competitors

Attribute
4P dChat
Push Chat
Dechat
XMTP Chat
Decentralization Coefficient
= L1/L2
TBD
TBD
TBD
Wallet login
🚫
Public On-Chain Communication
🚫
🚫
🚫
Group Chat
🚫
E2E Encryption
E2E Group Chat E2E Encryption
TBD
🚫
Self-Custodial E2E Encryption
🚫
🚫
🚫
Immutable Communication
TBD
🚫
TBD
Communication & Data Portability
TBD
🚫
Decentralized Storage
🚫
TBD
Self-custodial Decentralized Storage
🚫
🚫
TBD
Self-Custodial Open-source Application
🚫
Multi-Chain Deployment
🚫
TBD
No Data Mining
TBD
TBD
TBD
De-platforming Resistant
TBD
TBD
White-Label Availability
TBD
🚫
Explanation:
  • Decentralization Coefficient: Compared to many Web3 competitors, 4P has no long roadmap to decentralization, nor does it take any shortcuts. Due to its unique on-chain “1 email/message = 1 L1/L2 transaction” model 4Ps decentralization coefficient is directly correlated to the decentralization of the underlying public blockchain network.
  • W2W Login: In most cases, users don't own their email address, which is owned by the email platform. On the other hand, users do own their wallet address, which enables permissionless 4P login access with no phone number required.
  • Public On-Chain Communication: In the case of 4P, one email or message is represented as one L1 or L2 transaction, while data files and bigger objects are stored on decentralized storage. This model enables "true" decentralized communication that is non-custodial, permissionless, immutable, and Web2 data mining-resistant therefore the complete opposite of the legacy off-chain centralized communication that we use every day.
  • Group Chat: 4P enables the creation of chat groups where messages in the form of L1/L2 transactions are executed via public blockchains. Depending on the E2E encryption utilisation the groups can be private or public.
  • Self-Custodial E2E Encryption: Encryptor Extension adds the communication end-to-end encryption layer within dMail & dChat currently unsupported in major wallets. It enables user encryption self-custody not available before in any digital communication.
  • E2E Group Chat E2E Encryption: Developing the framework for on-chain end-to-end encryption group messaging was a challenge. Solved by the OCC SDK by the random generation of the secret key, that is used to encrypt/decrypt messages. The secret key is distributed to all group members and separately encrypted with AES over the ECDH key agreement protocol.
  • Immutable Communication: Due to its unique 1 email/message = 1 L1/L2 transaction model, the 4P emails and messages are immutable, enhancing communication transparency and trust.
  • Communication & Data Portability: Compared to siloed communication applications, the emails, messages and accompanying data within the 4P system are portable. 4P application acts only as a conduit enabling communication interaction.
  • Self-Custodial Open-source Application: Communication is executed on public blockchains where only users can access it and decrypt it using their private keys. In the case of the 4P downtime, anyone can spin up their open-source dMail or dChat application and access their communication data.
  • Decentralized Storage: 4P utilises self-custodial decentralized storage via PollinationX. Programmed with predetermined storage capacity, the PollinationX Storage NFT or short PX sNFT represents the decentralized storage unit (e.g. 100MB, 5GB, 10GB, 20GB, 100GB) and enables users to mint the storage according to specific needs in a true self-custodial manner.
  • Multi-Chain: 4P multi-chain support allows it to be usable across various public EVM blockchains, providing flexibility and choice.
  • Data Mining: Data mining has become the core revenue driver behind many communication platforms. Due to the 4P's decentralized and self-custodial design, the users are in complete control over their data. No data ownership is lost or data mined in the process.
  • De-platforming Resistant: The core self-custodial design and communication data portability make the 4P application de-platforming resistant.
  • White-Label: The 4P application is open-source so anyone can fork it. It will also be available as plug & play white label shortly.
Disclaimer: The research data was collected to the best of our ability and understanding. In the case of incorrect data, please submit a correction.